Collusion in VCG Path Procurement Auctions - Microsoft

2 downloads 0 Views 218KB Size Report
We consider collusion in path procurement auctions, where payments are determined ..... computes the payments using the alternative path 〈e1, e3〉 of cost 8.
Collusion in VCG Path Procurement Auctions Yoram Bachrach1 , Peter Key1 , and Morteza Zadimoghaddam2 1

Microsoft Research, Cambridge, UK yobach,[email protected] 2 MIT, Cambridge, MA [email protected]

Abstract. We consider collusion in path procurement auctions, where payments are determined using the VCG mechanism. We show that collusion can increase the utility of the agents, and in some cases they can extract any amount the procurer is willing to offer. We show that computing how much a coalition can gain by colluding is NP-complete in general, but that in certain interesting restricted cases, the optimal collusion scheme can be computed in polynomial time. We examine the ways in which the colluders might share their payments, using the core and Shapley value from cooperative game theory. We show that in some cases the collusion game has an empty core, so although beneficial manipulations exist, the colluders would find it hard to form a stable coalition due to inability to decide how to split the rewards. On the other hand, we show that in several common restricted cases the collusion game is convex, so it has a non-empty core, which contains the Shapley value. We also show that in these cases colluders can compute core imputations and the Shapley value in polynomial time.

1

Introduction

Collusion is an agreement between agents to defraud in order to obtain an unfair advantage [22]. We examine collusion in path procurement auctions (PPAs), where a buyer procures a path from a source s to a target t in a graph G = hV, Ei. Each edge ei ∈ E is owned by ai , who incurs a cost ci when her edge is used. The cost ci is known only to ai . The buyer must compensate edges on the chosen path for their costs. Given the private costs, a mechanism can find the minimal cost s − t-path. The mechanism can ask each ai for the minimal amount it would be willing to receive to allow using ei . If ai answers (bids) truthfully, this is her cost ci . However, the costs are the agents’ private information and they may bid strategically to increase their payment. VCG mechanisms [23, 10, 13] are used to incentivise agents to reveal their true costs. VCG has desirable properties, but is susceptible to collusion. Though any single agent is incentivised to bid truthfully, several agents may coordinate bids and split the gains from manipulating. We show how agents might collude and share the gains in VCG PPAs. Our model follows the collusion game of [4], but applied to PPAs. 1.1

Preliminaries

In VCG mechanisms we have an agent set N = {1, . . . , n}. The mechanism chooses an alternative from the set K. Agents report a type θi ∈ Θi , representing her preferences over K, and each agent i has a valuation wi (k, θi ) depending on the chosen k ∈ K. The

mechanism uses the choice rule k : Θ1 × ... × Θn → K, and agent i must also make a payment ri to the mechanism, according to a payment rule ti : Θ1 × ... × Θn → R. We assume quasi-linear utility ui (k, pi , θi ) = wi (k, θi )−ri . An agent i may manipulate and ∗ 0 report type θi0 P = si (θi ), according to its strategy si . Groves mechanisms )= P use k (θ 0 0 0 arg maxk∈K i wi (k, θi ) and payment rule: ri (θ ) = hi (θ−i ) − j6=i wj (k ∗ , θj0 ), where hi : Θ−i → R only depends on the reported types of agents other than i. We P 0 ∗ 0 consider the case of VCG, where: hi (θ−i ) = j6=i wj (k−i (θ−i ), θj0 ). Our collusion analysis uses coalitional game theory. A transferable utility coalitional game is composed of a set N of n agents, and a characteristic function mapping any agent subset (coalition) to a value v : 2N → R, indicating the total utility these agents achieve together. The function only defines the gains a coalition achieves, not how to distribute them. An imputation (p1 , . . . , pn ) divides the the gains among the Pn agents, where piP ∈ R, such that i=1 pi = v(N ). We call pi the payoff of agent i, and denote p(C) = i∈C pi . A key issue is choosing the appropriate imputation. A basic imputation requirement is individual rationality: for any i ∈ N , pi ≥ v({i}). Otherwise, agent i is incentivized to work alone. Similarly, coalition B blocks imputation p if p(B) < v(B), since B’s members are better off working on their own. A solution concept focusing on this is the core [12]: the set of all imputations p not blocked by any coalition, so for any C ⊆ N we have: p(C) ≥ v(C). Another solution concept is the Shapley value [20] which defines a single value division. It focuses on fairness, rather than stability. The Shapley value fulfills important fairness axioms [20, 25] and has been used to fairly share gains or costs. The Shapley value of an agent depends on its marginal contribution to possible coalition permutations. We denote by π a permutation (ordering) of the agents, and by Π the set of all possible such permutations. Given permutation π ∈ Π = (i1 , . . . , in ), the marginal worth vector mπ [v] ∈ Rn is defined as mπi1 = v({i1 }) and for k > 1 as mπik [v] = v({i1 , i2 , . . . , ik }) − v({i1 , i2 , . . . , ik−1 }). The convex hull of all the marginal vectors is called the Weber Set. Weber showed [24] that the Weber set of any game contains its core. The Shapley value is the centroid of the marginal vectors. Definition 1. The Shapley value is the payoff vector: φ[v] =

1 n!

P

π∈Π

mπ [v].

Our analysis is based on the notion of convex games. For convex games it is known [21] that the core is non-empty, and that the Weber Set is identical to the core. The Shapley value is a convex combination of the marginal vectors and lies in the Weber Set, so in convex games, the Shapley value lies in the core. Definition 2. A game is convex if: ∀A, B ⊆ I, v(A ∪ B) ≥ v(A) + v(B) − v(A ∩ B).

2

Collusion in VCG Path Procurement Auctions

Consider a PPA in a graph G = hV, Ei, where the buyer procures edges P ⊆ E forming an s − t-path from a set of agents, each owning an edge in the graph. We identify an agent ai with her edge ei ∈ E. Each agent has a cost ci associated with her edge and the mechanism asks each ai to provide a bid bi for using the edge. If the agent is truthful,

she would report ci . Given the edges’ true costs, one can find the minimal cost s − tpath, but the costs are private information. The canonical solution to induce truthfulness is the VCG mechanism. As discussed in Section 1.1, using VCG prices makes truthful cost revelation the dominant strategy, and results in procuring the cheapest path. Given the edge costs, this path can easily be computed in polynomial time. Observation 1 (Computing VCG Prices) Let G = hV, Ei be a path procurement domain, with cost ci for edge ei ∈ E, and let bi be the bid of ei . Denote the minimal cost path (according to the declared bi ’s) as (ei1 , ei2 , . . . , eix ) (of x edges), and let the optimal path not including ei be ej1 , ejP 2 , . . . , ejy (of Pyx edges). If ei is on the chosen y path, the payment to ei ’s owner is pi = s=1 bjs − s=1 bis + bi , otherwise pi = 0. 2.1

Colluding in VCG Path Procurement Auctions

We begin with collusion examples. Denote the payment to agent ai when all the agents bid truthfully (i.e. ai bids her true cost so bi = ci ) as pi . Given a set of edges CP⊆ E, we denote the VCG payments of all of them under truthful revelation as p(C) = ei ∈C pi .

Fig. 1. Left: domain for Examples 1, 2, 3. Right: domain for Example 4.

Example 1 (Collusion on the cheapest path). Consider the graph on the left of Figure 1, with two s − t-paths: r1 = hs, u, w, ti with costs c3 = 1, c4 = 1, c5 = 1 and r2 = hs, q, ti with edge costs c1 = 2, c2 = 2. The cheapest path is r1 with cost cr1 = 1+1+1 = 3, and the second cheapest path is r2 with cost cr2 = 2+2 = 4. Consider the agents on r1 : C = he3 , e4 , e5 i. If all the edges truthfully declare their costs (so ai bids bi where bi = ci ), applying Observation 1 we obtain payments: p3 = 2, p4 = 2, p5 = 2. Thus, we have p(C) = 2 + 2 + 2 = 6. Suppose each of the agents in C reports having no cost, bidding b03 = b04 = b05 = 0. This manipulation does not change the chosen path, as the cheapest path remains r1 . However, the payments do change. Denote the payments when the agents in C bid untruthfully (so b03 = b04 = b05 = 0) and the agents in I \ C bid truthfully (so b01 = c1 = 2, b02 = c2 = 2) as p0 = hp01 , p02 , . . . , p06 i. Recomputing VCG payments for b0 we obtain p03 = p04 = p05 = 4. Thus each member

of from this manipulation, and the total payments for the C become p0 (C) = PC benefits 0 ei ∈C pi = 12. Note the actual costs of the agents in C have not changed, but total payments increased by 12 − 6 = 6. The cost of the coalition C when r1 is chosen is c1 + c2 + c3 = 1 +P 1 + 1 = 3, so through this manipulation, the coalition moves from P a utility of p(C) − i∈C ci = 6 − 3 = 3 to p0 (C) − i∈C ci = 12 − 3 = 9. Example 2 (Collusion on a s-t cut). Examine the left of Figure 1 again, but consider the case where C = he1 , e3 i collude, and e2 , e4 , e5 bid truthfully. Under truthfully declarations, the chosen path is r1 with payments: p1 = p2 = 0, p3 = p4 = p5 = 2. We have p(C) = p1 + p3 = 2, and since P r1 is chosen, e3 incurs a cost c3 = 1 so the utility of the coalition C is p(C) − i∈C∩r1 ci = 2 − c3 = 2 − 1 = 1. Now suppose the colluders in C manipulate and bid b01 = h (for a high number h > 2, say h = 100), and b03 = 0 1 , while e2 , e4 , e5 bid truthfully. Again, the manipulation does not change the chosen path which is still r1 , but the payments do change. Again, we denote the payments when the agents in C bid untruthfully (b01 = h, b03 = 0) and the agents in I \ C bid truthfully as p0 = hp01 , p02 , . . . , p05 i. Recomputing the VCG payments under p0 we get p01 = 0, p03 = h + 2 − 2 = h. Thus, p(C) = h. Since r1 is still the chosen P path, e3 still incurs the cost c3 . Thus the new utility of the coalition C is p(C) − i∈C∩r1 ci = h − 1. Since the payment of the coalition depends on its chosen value for h, its utility is unbounded. One might claim that since a1 did not increase her utility, she might not be willing to collude (lie for a3 ). To get a1 to cooperate, a3 can easily compensate a1 via a monetary transfer. Without such a monetary transfers, all the payment goes to P e3 . However, using such a transfer, the utility of the coalition of colluders, p(C) − i∈C∩r1 ci = h − 1, can be shared between e1 and e3 in any. Example 3 (Collusion on the non-optimal path). Consider the left of Figure 1, with the optimal path r1 and the second cheapest path r2 . Suppose C = he1 , e2 i collude (edges of a non-optimal path), and e3 , e4 , e5 bid truthfully. Under truthful declarations the chosen path is r1 , and p1 = p2 = 0 (as r1 = he3 , e4 , e5 i is chosen and not r2 = he1 , e2 i), so we have p(C) = 0, and the utility of C is 0. If C manipulates by bidding b01 = b02 = 0, the chosen path is r2 rather than r1 , and the payments are p01 = p02 = 3, so we have p0 (C) = 6. However, since r2 is chosen, P edges e1 , e2 incur the costs of c1 = c2 = 2, so the coalition’s utility is p(C) − i∈C ci = 6 − 4 = 2. Thus, this manipulation gives C a utility of 2, rather than 0. Without transfers, this utility is shared equally between e1 and e2 , but it can be shared in any way using transfers. Example 2 is troublesome, as the colluders achieve unbounded payment from the mechanism2 . Example 3 shows that even agents on a non-optimal path can manipulate. We now show an example where beneficial manipulations exist, but due to the network structure, the colluders cannot find a stable way to share the gains from manipulating. Example 4 (Empty Core). Consider Figure 1 on the right. The cheapest path is r1 = he1 , e2 i with cost 8, the second cheapest path is r2 = he5 i with cost 10, and the third 1

2

For this case, e3 may as well report its true cost. However, if the coalition has other edges on the cheapest path (e.g. e4 or e5 ), this increases their payment as well. Colluders who can disconnect s and t get any amount the procurer has. This is not surprising as the good sold is s − t connectivity, and the colluders’ cartel controls all the supply.

cheapest is r3 = he3 , e4 i with cost 12. Under truthful declarations r1 is chosen, and the payments are p1 = p2 = 6 (other payments are 0). Coalition Ct = he1 , e2 i can manipulate similarly to Example 1 by bidding b01 = b02 = 0 to achieve p0 (Ct ) = 10 + 10 = 20. This raises the utility of Ct from 12 − 8 = 4 to 20 − 8 = 12. However, Coalition Cb = he3 , e4 i can manipulate similarly to Example 3 by bidding b03 = b04 = 0 to achieve a p0 (Cb ) = 8 + 8 = 16 3 . This raises the utility of Cb from 0 to 16 − 12 = 4. Consider the case where C = Ct ∪ Cb = {e1 , e2 , e3 , e4 } collude. C doesn’t control e5 so its payment cannot exceed 10 per edge. Either he1 , e2 i or he3 , e4 i or he5 i is chosen, so the total payment for C cannot exceed 20. The minimal cost C incurs to get any payment is 4 + 4 (routing through he1 , e2 i). Thus C’s utility is bounded by 20 − 8 = 12, similarly to Ct , and achievable the same way. Thus, Cb adds no value to coalition Ct . Consider what happens when C = {e1 , e2 , e3 , e4 } try to agree on what to bid and how to share the gains. The optimal collusion bids for them get them a utility of 12. Edges e1 , e2 (of Ct ) might claim they deserve all this utility, as they can achieve this utility on their own. However, e3 , e4 (of Cb ) would claim they deserve at least 4, as they achieve 4 on their own. This results in an unstable coalition and in threats between the coalition members 4 . Section 3 characterizes this as a collusion game with an empty core. In Example 4 , though the colluders have a beneficial manipulation, they find it hard to form a coalition due to inability to decide how to share the reward. We characterize such situations using the collusion game. Despite hopes of having such instability mitigate collusion, we show that for natural coalitions the colluders can always share the gains in a stable way. We focus on coalitions where all colluders are on the cheapest path (as in Example 1) or a non-optimal path (as in Example 3). 2.2

Collusion Schemes

We consider optimal manipulations in VCG PPAs. Such collusion requires trust among the colluders, as they must coordinate and since in many domains collusive behavior is 3

4

These are the payments where only e3 , e4 collude, so e1 , e2 truthfully declares their cost, so under the collusion, the VCG mechanism chooses he3 , e4 i as the “cheapest” path, and computes the payments using the alternative path he1 , e3 i of cost 8. Agents e3 , e4 might threaten to bid b03 = b04 = 0 creating two zero cost paths, so the result would depend on how the mechanism breaks ties. In this case, the agents on the winning path would get a zero payment. If coalition {e1 , e2 , e3 , e4 } breaks down into two coalitions {e1 , e2 } and {e3 , e4 } (each pair bidding in a coordinated manner), we have a normal form game. Each pair chooses the total cost of the path, the pair with lower cost winning and obtaining a total reward of the difference between the paths’ costs plus its declared cost. A pure strategy Nash equilibrium is where the truly cheap path bids zero, and the truly expensive path bids highly enough to guarantee the cheap path a positive utility: the total payment to the cheap path is k(h − l) + l where k is the number of edges on it and h and l are the declared path prices, so when h is high enough this exceeds the cheap path’s true cost. If these are the only two paths, there is another Nash equilibrium: the cheap path bids highly, H, and the expensive path bids zero: the expensive path has a positive utility when winning and the cheap path can only win by bidding zero, in which case it would have a negative utility. When analyzing the core of the collusion game, we assume members dropping out do not form a new cartel and bid truthfully. Even under this easier assumption, some collusion games have empty cores.

forbidden (the colluders face dire consequences if caught). We first show that in general, given a colluder coalition C, finding the optimal collusion or the utility of a colluder coalition when it optimally manipulates for a coalition is NP-complete. Theorem 1. Computing the optimal coalition manipulation in a VCG PPA is NP-Complete. Proof. Computing the optimal manipulation value is in NP (up to any desired degree of numerical accuracy), since we can non-deterministically choose bids and check if we have a manipulation achieving the target utility. To show NP-hardness, we reduce from LONGEST-PATH (LP), where we are given a graph G = hV, Ei and are asked to return the length of the longest simple path in it, known to be NP-Complete. Given the LP instance G = hV, Ei, we create a graph G0 = hV ∪ {s, t}, E 0 i, which contains a copy of G and two other vertices: s which serves as the source and t which serves as the target of the PPA. All of G’s edges are also replicated. Also, the source s is connected to the all the vertices in G, and any vertex is G is connected to the target t. We denote all edges (s, v) where v ∈ V as S, and all edges (u, t) where u ∈ V as T . We create an edge eH , connecting s and t. All edges have a cost of ce = 1 except edges in S ∪ T ∪ {eH }. Edges in S ∪ T have zero cost, and eH has a cost H where H is a very high number (for example H > |E|2 ). The target coalition for which we find an optimal manipulation is C = E 0 \ eH = S ∪ T ∪ E, all edges except eH . Denote by L = (l1 , . . . , lq ) the longest simple path in G, and its length by q. Coalition C contains L, and so it can have all the edges in L ∪ S ∪ T bid zero, and all the other edges in C bid H + 1. Then, the cheapest path is (s, l1 , . . . , lq , t) with a declared cost of zero, so this path is chosen. Under this manipulation, the second cheapest path is (s, t) with cost H, so each edge is paid H, and the coalition is paid p(C) = (q + 2)H (there are q edges on the longest path in G, and the edges (s, l1 ) and (lq , t)). The coalition incurs the true cost of 1 on its q edges in L, so C has a total cost of q. Thus, this manipulation obtains C a utility of u∗ (C) = (q + 2)H − q. It is easy to see that u∗ (C) is the maximal utility C can obtain: the cheapest path must have a total cost of at most H or eH would be the chosen path, so any edge can be paid at most H, and since L is the longest simple path in G it is impossible to have more than q edges of G on the path the mechanism chooses. Since u∗ (C) = (q + 2)H − q and since we choose the value of H in the reduction, given u∗ (C) we can extract q, the length of the longest simple path in G. This proves we cannot compute the optimal manipulation bids, since given this manipulation we can compute the chosen path and VCG prices and since we know the true edge costs this allows computing u∗ (C). The hardness result of Theorem 1 forces us to examine restricted cases of the manipulation problem. In the extreme case where all the edges collude, they can guarantee any payment the procurer can pay 5 . In typical domains, the set of colluders is unlikely to be all the edges or an arbitrary edge subset. A more reasonable colluder set can be a set of neighboring or close edges, or several edges that are all on a single s − t path. We examine cases where we can tractably compute the optimal manipulation. Example 1 is an example of a simple case, where all colluders are on the cheapest s − t path, and the 5

We later show that it suffices for the colluders to be able to disconnect s and t.

second cheapest path runs in parallel to the cheapest path. Example 3 shows the second simple case, where all colluders are on a non-optimal s − t path, which runs in parallel to the cheapest path, and can underbid the truly optimal path. Consider the case where all colluders are on the cheapest path. C is a simple coalition on the cheapest path if these hold for all ei ∈ C: edge ei is on the cheapest s − t path; when removing ei , the cheapest s − t-path contains no edge ej ∈ C. Similarly, C is a simple coalition on a non-optimal path if the following hold: all edges ei ∈ C are ∗ ∗ a non-optimal s − t path, r; the cheapest path rP does not intersect P r, so r ∩ r = ∅; r 0 becomes cheapest when bi = 0 for all ei ∈ C: ei ∈r\C ci < ei ∈r∗ ci . The following theorems are regarding a VCG PPA, where edge ei bids bi and has cost ci , and where C is a simple coalition on the cheapest path r1 . We assume that all non-coalition members bid truthfully, so for ei ∈ I \ C we have bi = ci . Theorem 2 (Simple Cheapest Path Collusion). Let C be a simple coalition of colluders on the cheapest path r1 . ThePoptimal collusion, maximizing payments pi of any ei ∈ C (and C’s payment p(C) = ei ∈C pi ) is zero bids: bi = 0 for all ei ∈ C. Proof. Denote the cheapest path under truthful declarations as r1 , and the cheapest path under truthful declarations that does not contain any edge in C as r2 . Consider an edge ei ∈ C that increases its bid beyond ci . This increases the cost of r1 under declared bids. If several agents in C declare such increased costs so that the cost of r1 under these modified costs is more than the cost of r2 , the path r2 will be chosen, resulting in a payment of 0 to all agents in C. Since VCG is individually-rational, this manipulation is not beneficial to the colluders. Thus, it suffices to focus on manipulations where the bids of edges in C are such that the cost of r1 is at most the cost of r2 , so the procured path is r1 . Eliminating any edge ei ∈ C disallows the use of r1 , and for any ei ∈ C we denote by r−i the cheapest path when eliminating ei . Since C is a simple coalition on the cheapest path we have r−i ∩ C = φ. Thus for ei , ej ∈ C we have r−i = r−j . Since ei , ej are arbitrary edges in C, this means that the cheapest path after eliminating any edge in C is the same path r. This path r cannot contain any edge ei ∈ C, so it is simply the cheapest

path that does not contain any edge in C, r2 . Denote the edges in r = r2 as r2 = ej1 , ej2 , . . . , ejy (y edges). Denote the edges of r1 as r1 = hei1 , ei2 , . . . , eix i (x edges, containing the edges of C). We assume all agents in r2 bid truthfully, and denote thePtotal cost ofP r2 as c(r2 ). Thus, the formula Px of Observation 1 can be written y x as: pi = s=1 bjs − s=1 bis + bi = c(r2 ) − s=1,ei 6=i bis . Note that the agents s in C control the bids {bi |ei ∈ C}, and since each bi must be non-negative (the cost of using edge ei ), each pi is maximized when the bids are minimal. Thus, the optimal manipulation is bidding bi = 0 for all ei ∈ C. Theorem 3 (Simple Non-Optimal Path Collusion). Let C be a simple coalition of colluders on the non optimal path r. The optimal collusion, which P maximizes all the payments pi of any coalition member (and C total payment p(C) = ei ∈C pi ) is zero bids: bi = 0 for all ei ∈ C. Proof. The proof is almost identical to Theorem 3. We denote the non optimal path r which contains all the colluders as hei1 , ei2P , . . . , eix i, denote the cheapest path (under x true costs) as r∗ , and obtain: pi = c(r∗ ) − s=1,eis 6=i bis .

Theorem 4 (Cut Collusion). Let C be a coalition whose Premoval disconnects s and t, and h > 0 be some value. The colluders can bid so that ei ∈C pi > h. Proof. At least one ex ∈ C must be used in the chosen s − t path, as C is an s − t cut. VCG is individually rational so if all e ∈ C bid b0i = h, for ex we have pi > h.

3

The Collusion Game

Consider a PPA over G = hV, Ei with source s and target t. We examine a subset C ⊆ N , who may decide to collude. Under truthful bidding, VCG chooses path r1 = hei1 , ei2 , . . . , eix i and payments pt1 , . . . , ptn 6 . If the agents in C decide to collude, they can form a coalition and use a collusion scheme, such as those of Section 2.1. Denote the chosen path under the optimal manipulation as r∗ = he∗1 , . . . , e∗z i and the payments under the manipulation p∗1 , . . . , p∗n . Some manipulations, such as the optimal manipulation for simple collusion on the cheapest path, do not change the chosen path, so r∗ = r1 , but increase the payments to coalition members so p∗i ≤ pti for any i ∈ C. Other schemes, such as collusion on a non-optimal path, change the selected path, so r∗ 6= r1 . The coalition members gain payments, but the members on the chosen path, C ∩ r∗ , also P incur the cost Pof their edges. Thus, the utility of the colluder coalition C is: u∗ (C) = i∈C p∗i − i∈C∩r∗ ci . Using monetary transfers, the coalition’s utility can be distributed among its members in any way they choose. We define a coalitional game, based on the total utility a coalition of colluders generates its members. Definition 3 (Path Procurement Collusion Game). Given a VCG PPA, the value v(C) of a coalition C ⊆ N is: v(C) = u∗ (C). In order to manipulate the colluders must trust each other, or sign a certain enforceable contract, so the coalition C is typically be restricted to only a certain subset of the agents. Given the above definition, Theorem 1 simply says that in general it is hard to even compute the value of a coalition in the collusion game. However, Theorem 2, Theorem 3 and Theorem 4 all show that for important restricted cases, finding the optimal manipulation is trivial. The above definition of the game also allows us to apply solution concepts to decide how the colluders might share their rewards. The core characterizes stability, where no subset of the coalition is incetivised to operate on its own. The Shapley value characterizes a fair allocation of the reward, reflecting each member’s contribution. Having defined the collusion game, the theme of Example 4 is simple — this network structure results in the collusion game having an empty core 7 . One might hope that most network structures result in empty cores, so the colluders would not have a stable way of sharing the reward. If this were the case, the problem of collusion would be mitigated since despite the existence of profitable manipulations, the colluders would fight amongst themselves regarding the monetary transfers, and never form a lasting coalition. Unfortunately, we show that for the common cases of 6 7

The subscript t stands for truthful. Example 4 has disjoint Ct and Cb where v(Ct ∪Cb ) = v(Ct ) but v(Cb ) > 0 so p(Ct ∪Cb ) = p(Ct ) + p(Cb ) ≤ v(Ct ). One core constraint is p(Ct ) ≥ v(Ct ) so p(Ct ) = v(Ct ) = v(Ct ∪ Cb ) and p(Cb ) = 0. Another is p(Cb ) ≥ v(Cb ) > 0, so some core constraints fail.

simple collusion (along the cheapest path or along a non-optimal path), the game always has a nonempty core, and there is a polynomially computable core imputation. Also, regarding fairness, we show that the Shapley value, considered “fair”, is also in the core and easy to compute. Thus, the colluders can share the gains in a stable and fair manner 8 , making collusion a significant problem in such auctions. Our results are based on showing the game is convex. We show convexity by examining the payment of a simple coalition C (on the cheapest path or on a non-optimal path). Denote the cheapest path as r1 and the cheapest path that contains no edges in C as r2 . Denote the non colluders P on the cheapest path r1 as Tr1 = r1 \ C. Denote P the cost of a path r as c(r) = i∈r ci , and the cost of the edges in Tr1 as c(Tr1 ) = i∈Tr ci . 1

Lemma 1 (Shortest Path Collusion Payments). Let C be a simple coalition of colluders on the cheapest path. The total payment to the colluders under the optimal manipulation is P ∗ (C) = |C|(c(r2 ) − c(Tr1 )). Proof. From Theorem 2, any colluder i ∈ C would bid bi = 0. Thus, the formula of Observation 1 is simplified to pi = c(r2 ) − c(Tr1 ) (independent of the colluder’s identity). Since there are |C| colluders we obtain P ∗ (C) = |C|(c(r2 ) − c(Tr1 )). For collusion on a non-optimal path, we denote the optimal (cheapest) path as r1 and non optimal path that contains C as r. We denote P the non colluders on r as Tr = r \ C. The total cost of the edges in Tr is c(Tr ) = i∈Tr ci . Lemma 2 (Non-Optimal Path Collusion Payments). Let C be a simple coalition of colluders on a non-optimal path. The total payment to the colluders under the optimal manipulation is P ∗ (C) = |C|(c(r1 ) − c(Tr ). Proof. The proof is similar to Lemma 1. Theorem 5 (Convexity of the Collusion Game). The collusion game is convex for simple coalitions (along the cheapest path or a non-optimal path). Proof. We give the proof for a simple coalition along the cheapest path (the other case is almost identical). An alternative definition of convex games is: ∀S 0 ⊆ S ⊆ I, ∀i ∈ / S: v(S 0 ∪ {i}) − v(S 0 ) ≤ v(S ∪ {i}) − v(S). We show this for simple coalition on the cheapest path, S. Consider any S 0 ⊂ S, denote S \ S 0 = B, and let a be any agent in r1 \ S. Denote T = r1 \ S \ {a}. Denote |S| = h and |S 0 | = l (where l ≤ h), and denote c(r2 ) = x. Using Lemma 1 we can write v(S), v(S ∪ {a}), v(S 0 ), v(S 0 ∪ {a}). We have: v(S ∪ {a}) = v(S 0 ∪ B ∪ {a}) = (h + 1)(x − c(T )) − c(S 0 ) − c(B) − ca ; v(S) = v(S 0 ∪ B) = h(x − ca − c(T )) − c(S 0 ) − c(B); v(S 0 ∪ {a}) = (l + 1)(x − c(B) − c(T )) − C(S 0 ) − Ca ; v(S 0 ) = l(x − c(B) − ca − c(T )) − c(S 0 ). Opening parentheses and canceling terms we get: v(S ∪ {a}) − v(S) = x + h · Ca − c(T ) − Ca ; v(S 0 ∪ {a}) − v(S 0 ) = x + l · Ca − c(T ) − Ca − c(B). However, l · Ca ≤ h · Ca and c(B) is non-negative, so we have v(S 0 ∪ {i}) − v(S 0 ) ≤ v(S ∪ {i}) − v(S). 8

“Fairness” here is for the colluders — the manipulations are devastating for the auctioneer.

Convexity of the collusion game has implications regarding how the colluders can share the gains. Collusion causes the prices paid to the agents to rise, and monetary transfers allow the colluders to share the utility in any way they desire. Under unstable utility distributions the colluders’ coalition is likely to disintegrate, but convexity guarantees a stable distribution, so the colluders can distribute the gains so no subset of the colluders would benefit from leaving the coalition. The colluders may also want to share the utility in a fair manner, using the Shapley value. In general, even if there are stable allocations, the Shapley value may be unstable. Unfortunately, for simple coalitions, a stable allocation always exists, and the Shapley value is also stable. Corollary 1. For simple coalitions (on the cheapest path or on a non-optimal path), the collusion game has a non-empty core, containing the Shapley value. Proof. The collusion game is convex (Theorem 5), so it has a non-empty core coinciding with the Weber set. The Shapley value is in the Weber set so it is in the core. A final barrier against collusion is computational complexity. Theorem 1 shows that finding the optimal collusion is hard, but it is trivial for simple coalitions. Corollary 1 guarantees the colluders a fair and stable allocation but it might be hard to compute, even for simple coalitions. We show that for simple coalitions, the colluders can tractably compute a simple core imputation or the Shapley value. Since the game is convex, the Weber set is identical to the core. Given a permutation π = hπ1 , . . . , πn i of the agents and an agent ei , denote the predecessors of i in π as Fπi . Denote mπi = v(Fπi ∪{ei })−v(Fi ), and note this can be computed in polynomial time using Lemma 1 (or Lemma 2). The imputation hmπ1 , mπ2 , . . . , mπn i is in the Weber set (the Weber set is the convex hull of all these vectors for different permutations π), and so is a core imputation. A naive way of computing the Shapley value, the centroid of such vectors, requires performing this process for all agent permutations π, requiring exponential time. We show a polynomial algorithm to compute Shapley value. Theorem 6. For simple coalitions (on the cheapest path or on a non-optimal path), the Shapley value can be computed in polynomial time. Proof. The contribution of edge ei to coalition C (where ei ∈ / C), v(C ∪ {ei }) − v(C) only depends on |C|, not on who the specific members of C are. Due to Lemma 1, we have p∗ (C) = |C|(c(r2 ) − c(TrC1 )) where TrC1 = Pr1 \ C are the non-colluders on the cheapest path. Denote c(r1 ) = x, c(r2 ) = y and i∈C ci = z. We have p∗ (C ∪{ei })− p∗ (C) = (|C| + 1)(y − c(r1 \ C \ {ei })) − |C|(y − c(r1 \ C)) = (|C| + 1)(y − x + z + ci ) − |C|(y − x + z) = |C|(y − x + z + ci − y + x − z) + (y − x + z + ci ) = |C| · ci + y − x + z + ci ). Collusion on thePcheapest path does not change the Pchosen path, so we have: v(C ∪ {ei }) − v(C) = − j∈C∪{ei } cj + p∗ (C ∪ {ei }) + j∈C cj − p∗ (C) = P −ci + |C| · ci + y − x + z + ci = |C| · ci + y − x + i∈C ciP . 1 i Consider computing the Shapley value for ei , φi (v) = n! π∈Π v(Fπ ∪ {ei }) − P i i v(Fπ ) (where Fπ are the predecessors of i in π). Denote ψi (v) = π∈Π v(Fπi ∪{ei })− v(Fπi ). We can compute ψi by iterating over the possible numbers of predecessors i has in π, |Fπi |. Let Πj be all permutations π ∈ Π such that |Fπi | = j (i.e. permutations where i has exactly j predecessors. We can denote the total contribution that i has for

P coalitions of size j as Mj = π∈Πj v(Fπi ∪ {ei }) − v(Fπi ). Thus we have ψi (v) = Pn−1 need to compute Mj in polynomial time (for 0 ≤ j ≤ n − 1). j=0 Mj . Thus we only P i i To compute Mj = π∈Πj v(Fπ ∪ {ei }) − v(Fπ ) we can sum over all possible predecessor sets for i where i has exactly j predecessors, F = {Fπi ⊆ N |π ∈ Πj }, P n−1 where |F | = j . Under this notation Mj = C∈F v(C ∪ {ei }) − v(C). We’ve P shown that v(C ∪ {ei })P − v(C) = |C| · ci + y − x + i∈C ci , so we have: Mj = P ci . Since C∈F |C|·ci +y −x+ i∈C P Pany C ∈ F have the same Psize |C| P = j, we get: Mj = |F | · (j · ci + y − x) + C∈F i∈C ci . We denote q = C∈F i∈C ci . Thus,  Mj = n−1 · (j · ci + y − x) + q. Consider computing q. Given the coalition C of size j |C| = m, denote the weights ci for all i ∈ C as W = hc1 , . . . , ci−1 , ci+1 , . . . , cm i (W is the set of the costs of all colluders except q is simply the sum of weights P ei ). Thus,P in all subsets of W of size j, i.e. q = S⊂W ||S|=j s∈S s. Any weight wi ∈ W   P n−1 P appears in q exactly n−1 times, so q = cx = n−1 c ∈W ex ∈C\{ei } cx . j−1 j−1 j−1 x P Given a colluder ei , we can easily compute ex ∈C\{ei } cx in polynomial time, and thus  compute q in polynomial time. This allows us to compute Mj = n−1 ·(j·ci +y−x)+q j Pn−1 in polynomial time, for any j. We can thus compute ψi (v) = j=0 Mj in polynomial time, and thus compute the Shapley value of any agent in polynomial time.

4

Related Work

Auctions face untruthful selfish agents, so due to strategic behavior, a mechanism trying to maximize welfare may reach a sub-optimal decision. Proper payment rules incetivize agents to bid truthfully. A prominent scheme for doing so is the VCG mechanism [23, 10, 13]. Despite its advantages, VCG has many shortcomings [3], including vulnerability to collusion [17]. Collusion can occur in many domains and many of its forms are illegal [17]. Our model follows an analysis of multi-unit auctions [4], but for the PPA domain [1]. We examine coalitional deviations, but as opposed to strong Nash equilibrium [2], we convert the normal-form game to a cooperative game. We provide an internal model of collusion, as opposed to external interventions models [18, 6, 19]. We focus on the core [12] and Shapley value [20]. The Shapley value and other power indices are typically hard to compute [16, 8], so our result for computing it in some collusion games is interesting. For general collusion games, the colluders can approximate [7, 16] the Shapley value in order to share their gains. Collusion is also related to shills and false-identity attacks [26, 9, 5, 27], where a single agent pretends to be several agents. A single edge in a VCG PPA can pretend to be several edges to increase payments. Our work is also related to of bidding rings and clubs [15, 14], but we assume the colluders have full information on each other’s costs. Core selecting auctions [11] are also related to our work, but we do not consider the auctioneer a participating agent, and the core in our collusion game can be empty.

5

Conclusion

We analyzed collusion in VCG PPAs, and showed that such a domain is vulnerable to collusion. Some questions remain open for future research. First, similar analysis can be

done for other auctions, such as combinatorial auctions or sponsored search auctions. Second, due to the drawbacks of VCG for PPAs, what alternative mechanisms should be used? Finally, what bids are likely to occur for domains with an empty core?

References ´ Tardos. Frugal path mechanisms. ACM Transactions on Algorithms 1. A. Archer and E. (TALG), 2007. 2. R. Aumann. Acceptable points in general cooperative n-person games. In Contributions to the Theory of Games, volume IV, pages 287–324. 1959. 3. L. M. Ausubel and P. Milgrom. The lovely but lonely vickrey auction. In Combinatorial Auctions, chapter 1, pages 17–40. 2006. 4. Y. Bachrach. Honor among thieves: Collusion in multi-unit auctions. In AAMAS, 2010. 5. Y. Bachrach and E. Elkind. Divide and conquer: False-name manipulations in weighted voting games. In AAMAS, pages 975–982, 2008. 6. Y. Bachrach, E. Elkind, R. Meir, D. Pasechnik, M. Zuckerman, J. Rothe, and J. Rosenschein. The cost of stability in coalitional games. Algorithmic Game Theory, pages 122–134, 2009. 7. Y. Bachrach, E. Markakis, E. Resnick, A. Procaccia, J. Rosenschein, and A. Saberi. Approximating power indices: theoretical and empirical analysis. Autonomous Agents and MultiAgent Systems, 20(2):105–122, 2010. 8. Y. Bachrach and J. S. Rosenschein. Computing the Banzhaf power index in network flow games. In AAMAS, pages 323–329, Honolulu, Hawaii, May 2007. 9. C. Chen and Y. Tauman. Collusion in one-shot second-price auctions. Economic Theory, 28:145–172, 2006. 10. E. H. Clarke. Multipart pricing of public goods. Public Choice, 11(1):17–33, 1971. 11. R. Day and P. Milgrom. Core-selecting package auctions. International Journal of Game Theory, 36(3):393–407, 2008. 12. D. B. Gillies. Some theorems on n-person games. 1953. 13. T. Groves. Incentives in teams. Econometrica, 41:617–663, 1973. 14. K. Leyton-Brown, Y. Shoham, and M. Tennenholtz. Bidding clubs: institutionalized collusion in auctions. In ACM EC, 2000. 15. K. Leyton-Brown, Y. Shoham, and M. Tennenholtz. Bidding clubs in first-price auctions. In AAAI, 2002. 16. Y. Matsui and T. Matsui. A survey of algorithms for calculating power indices of weighted majority games. Journal of the Operations Research Society of Japan, 43, 2000. 17. P. Milgrom. Putting Auction Theory To Work. Cambridge University Press, 2004. 18. D. Monderer and M. Tennenholtz. Strong mediated equilibrium. Artificial Intelligence, 173(1):180–195, 2009. 19. E. Resnick, Y. Bachrach, R. Meir, and J. Rosenschein. The cost of stability in network flow games. Mathematical Foundations of Computer Science 2009, pages 636–650, 2009. 20. L. S. Shapley. A value for n-person games. Cont. Theory of Games, 1953. 21. L. S. Shapley. Cores of convex games. Internat. J. Game Theory, 1:12–26, 1971. 22. A. Sullivan and S. Sheffrin. Economics: principles in action. Prentice Hall, 2003. 23. W. Vickrey. Counterspeculation, auctions, and competitive sealed tenders. The Journal of Finance, 16(1):8–37, 1961. 24. R. J. Weber. Probabilistic values for games. Technical report, Cowles, 1977. 25. E. Winter. The Shapley Value. Game theory with economic applications, 2002. 26. M. Yokoo, V. Conitzer, T. Sandholm, N. Ohta, and A. Iwasaki. Coalitional games in open anonymous environments. In AAAI, 2005. 27. M. Zuckerman, P. Faliszewski, Y. Bachrach, and E. Elkind. Manipulating the quota in weighted voting games. In AAAI, 2008.